• Account
    • Customer Login

Menu

  • Home
  • Contact
  • Our Company
  • Products
  • Request Trial
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Resources
    • Support
    • Events
    • Press
Home
Toggle mobile menu
1-800-662-6090
  • Home
  • Press
  • Support
  • Login
  • Products
    • Data Security
      • Encryption
        • MegaCryptionComprehensive Cryptography for the z/OS environment
        • MegaCryption PCSame great MegaCryption, but ported for use on PC systems.
        • MegaCryption IXSame great MegaCryption, but ported for use on Unix/Linux systems.
        • MegaCryption IDMSA variety of encryption options built specifically for CA IDMS data.
        • MegaCryption DB2MegaCryption encryption engineered specifically for DB2 systems on z/OS.
        • MegaZipArchival compression and encryption for z/OS for all common file formats.
        • CryptoZCryptography Diagnostic Tool
      • Administration
        • ERARACF Security Risk Assessment and Auditing
        • ERQRACF Administration, Reporting, and Custom Programming
    • Access Management
      • Password Reset
        • ReACTA centralized, enterprise-wide self-service password reset solution.
        • ReACT MFAMulti-Factor Authentication Tool
        • ReACT MGReACT for GSA Contract Holders.
      • Access Recovery
        • OARAccess recovery solution for off-network and/or offline devices.
      • User Provisioning
        • ProACTUser provisioning and identity management.
    • Systems
      • Data Management
        • WizDomA suite of solutions that includes tools for file maintenance, file aging, impact analysis, and date/time simulation.
      • Systems Administration
        • CIMEasy ICF catalog administration for z/OS operating systems.
        • SpaceCalcStorage efficiency right from the start: file modeling and allocation.
      • CICS
        • Command CICSCICS Migration Tool
        • HelpKeyCreate online help screens interactively without programming knowledge.
  • Industries
    • Education
    • Government
    • Healthcare
    • Finance
  • Our Company
    • Customer Testimonials
    • Community
    • International Distributors
  • Resources
    • News
    • Events
    • ReACT Calculator
    • Contact
    • Career Opportunities
  • Request Trial

News

Data Encryption In-Depth Guide in 2024

Published on April 26, 2024

Via AIMultiple Digital information is constantly being shared and stored on cloud and connected services. According to IBM, the average cost for a data breach involving 50 million to 65 million records is more than $400 million.1 Protecting sensitive data is the backbone of cybersecurity, and encryption has…

Seven Privacy Trends That Can Help Protect Your Business In 2024

Published on April 17, 2024

Via Forbes Data privacy laws in the U.S. have become a complex patchwork of local, state and national regulations. At the beginning of 2023, five states' privacy laws were set to go into effect, and another eight states established privacy laws that went and/or will…

The password attacks of 2023: Lessons learned and next steps

Published on April 12, 2024

Via BleepingComputer It should take more than eight characters to bring a business to a halt. However, the relentless onslaught of password-based cyber attacks underscores the alarming ease with which cybercriminals can exploit vulnerable credentials to inflict damage. Password attacks take many forms: from phishing…

Password Reset Calls Are Costing Your Org Big Money

Published on April 3, 2024

Via BleepingComputer Frustrating for both users and administrators, password management can be a challenge to manage in any organization. One lost or stolen password may be the crack in your organization's foundation, allowing an attacker to slip in. Conventional password recommendations have held that regular…

Data Protection Trends to Know in 2024

Published on March 29, 2024

Via ItSecurityWire Data protection tools keep changing with the latest data privacy requirements. To comply with them, businesses must ensure that systems process the right data under the new privacy regulations in 2024. Stricter data privacy laws drive the increasing use of data security and…

7 cybersecurity predictions to look out for in 2024

Published on March 15, 2024

via TechRadar What's in store for internet security and privacy next year? It's that time of the year again, so while we wait for the final tick of the clock, let's look back over the past 365 days in the world of cybersecurity and predict…

10 Password Statistics that Predict Online Security Trends in 2024

Published on March 14, 2024

via Skillademia Passwords have been the status quo for online security, but significant cracks are starting to show. As threats like phishing scams persist, tech leaders are shifting to more advanced login methods. Passkeys, which use device biometrics instead of passwords, are gaining steam at companies like…

Common Myths Around Mainframe Modernization—and How To Overcome Them

Published on March 13, 2024

via Planet Mainframe The first mainframe computer was invented almost one hundred years ago, in the late 1930s, when a Harvard University researcher needed help solving a series of equations. Since then, mainframes have consistently been an undeniable resource to organizations and enterprises across the…

Enhancing security: The crucial role of incident response plans

Published on March 6, 2024

via ComputerWeekly In today’s digital landscape, the importance of an effective security plan cannot be overstated. Such a plan is vital for safeguarding sensitive information and critical assets. Within this comprehensive security plan, there is a particular emphasis on the role played by an incident response…

Password Security Best Practices for 2024

Published on February 26, 2024

via Cyber Pandit As we approach the year 2024, technology continues to evolve at a rapid pace. Unfortunately, so do the cyber threats that come with it. It’s more important than ever to ensure that our online security is up to par and our passwords…

Previous 1 2 3 4 5 6 … 30 Next

Topics

  • Access Management
  • Business
  • Cryptography
  • Data Security
  • Event
  • Insider Program
  • Main Issue
  • Mainframes
  • Multi-Factor Authentication
  • News
  • Press
  • Press Releases
  • Uncategorized

Archives

  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013

3185 Horseshoe Drive South
Naples, FL 34104-6138 USA

  • Phone: (239) 649-1548
  • Toll-Free: (800) 662-6090
  • After Hours: (239) 649-3099

Access Management

  • ReACT
  • OAR
  • ReACT MG
  • ReACT MFA
  • ProACT

Systems

  • CIM
  • WizDom
  • SpaceCalc
  • HelpKey
  • Command CICS

Data Security

  • MegaCryption
  • MegaCryption PC
  • MegaCryption IX
  • MegaCryption IDMS
  • MegaCryption DB2
  • MegaZip
  • CryptoZ
  • ERQ
  • ERA

Compliance

  • Accessibility Statement

Facebook profile Twitter profile LinkedIn profile Instagram profile

Copyright 2025 Advanced Software Products Group. All Rights Reserved.

Built by BOOST Creative

arrow drop cross
Hit enter to search or ESC to close

Can't find what you need?

Contact us directly at (239)-649-1548

May We Suggest?

MegaCryption - MegaZip - CryptoMon - ERQ - ReACT - ERA - OAR - CommandCICS - Help/Key

Having trouble logging in? Reset your password